diff options
author | rameshiyer27 <ramesh.murugan.iyer@est.tech> | 2023-01-23 11:50:01 +0000 |
---|---|---|
committer | Ramesh Murugan Iyer <ramesh.murugan.iyer@est.tech> | 2023-01-25 14:32:51 +0000 |
commit | 0700486a08b2bc08589f7e6b0be8338d6bbb4efa (patch) | |
tree | 01672a1fb035e629f1723b6b7de6f8a28218bfdb /helm/tests/policy-clamp-test.robot | |
parent | 0132d7a9ea3ad03ed0350a7d89694420a4d8221c (diff) |
Add robot framework helm chart for CSIT
Steps to run policy csit in kubernetes is updated in the README.md
Issue-ID: POLICY-4532
Signed-off-by: zrrmmua <ramesh.murugan.iyer@est.tech>
Change-Id: I116658dfafd4e70bd256173f046da72af6803eaa
Diffstat (limited to 'helm/tests/policy-clamp-test.robot')
-rw-r--r-- | helm/tests/policy-clamp-test.robot | 98 |
1 files changed, 98 insertions, 0 deletions
diff --git a/helm/tests/policy-clamp-test.robot b/helm/tests/policy-clamp-test.robot new file mode 100644 index 00000000..9fefbc0a --- /dev/null +++ b/helm/tests/policy-clamp-test.robot @@ -0,0 +1,98 @@ +*** Settings *** +Library Collections +Library RequestsLibrary +Library OperatingSystem +Library String +Library json +Library yaml + +*** Test Cases *** +Healthcheck + [Documentation] Healthcheck on Clamp Acm + ${auth}= Create List runtimeUser zb!XztG34 + Log Creating session http://${POLICY_RUNTIME_ACM_IP}:6969 + ${session}= Create Session ACM http://${POLICY_RUNTIME_ACM_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= GET On Session ACM /onap/policy/clamp/acm/health headers=${headers} + Log Received response from ACM healthcheck {resp.text} + Should Be Equal As Strings ${resp.status_code} 200 + +#CommissionAutomationCompositionV1 +# [Documentation] Commission automation composition. +# ${auth}= Create List runtimeUser zb!XztG34 +# Log Creating session http://${POLICY_RUNTIME_ACM_IP}:6969 +# ${postyaml}= Get file ${CURDIR}/data/functional-pmsh-usecase.yaml +# ${session}= Create Session policy http://${POLICY_RUNTIME_ACM_IP}:6969 auth=${auth} +# ${headers}= Create Dictionary Accept=application/yaml Content-Type=application/yaml +# ${resp}= POST On Session policy /onap/policy/clamp/acm/v2/compositions data=${postyaml} headers=${headers} +# Log Received response from runtime acm ${resp.text} +# ${respyaml}= yaml.Safe Load ${resp.text} +# set Suite variable ${compositionId} ${respyaml["compositionId"]} +# Should Be Equal As Strings ${resp.status_code} 201 +# +#InstantiateAutomationCompositionV1 +# [Documentation] Instantiate automation composition. +# ${auth}= Create List runtimeUser zb!XztG34 +# Log Creating session http://${POLICY_RUNTIME_ACM_IP}:6969 +# ${postjson}= Get file ${CURDIR}/data/AutomationComposition.json +# ${updatedpostjson}= Replace String ${postjson} COMPOSITIONIDPLACEHOLDER ${compositionId} +# ${session}= Create Session policy http://${POLICY_RUNTIME_ACM_IP}:6969 auth=${auth} +# ${headers}= Create Dictionary Accept=application/json Content-Type=application/json +# ${resp}= POST On Session policy /onap/policy/clamp/acm/v2/compositions/${compositionId}/instances data=${updatedpostjson} headers=${headers} +# Log Received response from runtime acm ${resp.text} +# ${respyaml}= yaml.Safe Load ${resp.text} +# set Suite variable ${instanceId} ${respyaml["instanceId"]} +# Should Be Equal As Strings ${resp.status_code} 201 +# +#PassivateAutomationComposition +# [Documentation] Passivate automation composition. +# ${auth}= Create List runtimeUser zb!XztG34 +# Log Creating session http://${POLICY_RUNTIME_ACM_IP}:6969 +# ${postjson}= Get file ${CURDIR}/data/PassiveCommand.json +# ${session}= Create Session policy http://${POLICY_RUNTIME_ACM_IP}:6969 auth=${auth} +# ${headers}= Create Dictionary Accept=application/json Content-Type=application/json +# ${resp}= PUT On Session policy /onap/policy/clamp/acm/v2/compositions/${compositionId}/instances/${instanceId} data=${postjson} headers=${headers} +# Log Received response from runtime acm ${resp.text} +# Should Be Equal As Strings ${resp.status_code} 200 +# +#QueryPolicies +# [Documentation] Runs Policy Participant Query New Policies +# ${auth}= Create List policyadmin zb!XztG34 +# Log Creating session http://${POLICY_API_IP}:6969 +# ${session}= Create Session policy http://${POLICY_API_IP}:6969 auth=${auth} +# ${headers}= Create Dictionary Accept=application/json Content-Type=application/json +# ${resp}= GET On Session policy /policy/api/v1/policies headers=${headers} +# Log Received response from policy-api {resp.text} +# Should Be Equal As Strings ${resp.status_code} 200 +# +#QueryPolicyTypes +# [Documentation] Runs Policy Participant Query New Policy Types +# ${auth}= Create List policyadmin zb!XztG34 +# Log Creating session http://${POLICY_API_IP}:6969 +# ${session}= Create Session policy http://${POLICY_API_IP}:6969 auth=${auth} +# ${headers}= Create Dictionary Accept=application/json Content-Type=application/json +# ${resp}= GET On Session policy /policy/api/v1/policytypes headers=${headers} +# Log Received response from policy-api ${resp.text} +# Should Be Equal As Strings ${resp.status_code} 200 +# +#StateChangeRunningAutomationComposition +# [Documentation] AutomationComposition State Change to RUNNING. +# ${auth}= Create List runtimeUser zb!XztG34 +# Log Creating session http://${POLICY_RUNTIME_ACM_IP}:6969 +# ${postjson}= Get file ${CURDIR}/data/RunningCommand.json +# ${session}= Create Session policy http://${POLICY_RUNTIME_ACM_IP}:6969 auth=${auth} +# ${headers}= Create Dictionary Accept=application/json Content-Type=application/json +# ${resp}= PUT On Session policy /onap/policy/clamp/acm/v2/compositions/${compositionId}/instances/${instanceId} data=${postjson} headers=${headers} expected_status=400 +# Log Received response from runtime acm ${resp.text} +# +#QueryInstantiatedACs +# [Documentation] Get Instantiated AutomationCompositions +# ${auth}= Create List runtimeUser zb!XztG34 +# Log Creating session http://${POLICY_RUNTIME_ACM_IP}:6969 +# ${session}= Create Session policy http://${POLICY_RUNTIME_ACM_IP}:6969 auth=${auth} +# ${headers}= Create Dictionary Accept=application/json Content-Type=application/json +# ${resp}= GET On Session policy /onap/policy/clamp/acm/v2/compositions/${compositionId}/instances/${instanceId} headers=${headers} +# Log Received response from runtime acm ${resp.text} +# Should Be Equal As Strings ${resp.status_code} 200 +# Should Be Equal As Strings ${resp.json()['state']} UNINITIALISED2PASSIVE +# Should Be Equal As Strings ${resp.json()['orderedState']} PASSIVE |